{"title":"军事网络中的多代理系统","authors":"David L. Hancock, G. Lamont","doi":"10.1109/CICYBS.2011.5949411","DOIUrl":null,"url":null,"abstract":"Trends in computing and networking, in terms of physical capability, attack surface, and attacker sophistication, call for automated, fault-tolerant response systems. Military networks present such environments with unique authorities, critical systems, and threats. Within such environments, multi agent systems may make special contributions regarding recognisance and attack scenarios. We survey three multi agent systems designed for cyber operations, with particular emphasis on our classifier for flow-based attacks, which demonstrates the effectiveness of reputation for distributing classifying agents effectively.","PeriodicalId":436263,"journal":{"name":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Multi agent systems on military networks\",\"authors\":\"David L. Hancock, G. Lamont\",\"doi\":\"10.1109/CICYBS.2011.5949411\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trends in computing and networking, in terms of physical capability, attack surface, and attacker sophistication, call for automated, fault-tolerant response systems. Military networks present such environments with unique authorities, critical systems, and threats. Within such environments, multi agent systems may make special contributions regarding recognisance and attack scenarios. We survey three multi agent systems designed for cyber operations, with particular emphasis on our classifier for flow-based attacks, which demonstrates the effectiveness of reputation for distributing classifying agents effectively.\",\"PeriodicalId\":436263,\"journal\":{\"name\":\"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)\",\"volume\":\"88 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICYBS.2011.5949411\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICYBS.2011.5949411","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trends in computing and networking, in terms of physical capability, attack surface, and attacker sophistication, call for automated, fault-tolerant response systems. Military networks present such environments with unique authorities, critical systems, and threats. Within such environments, multi agent systems may make special contributions regarding recognisance and attack scenarios. We survey three multi agent systems designed for cyber operations, with particular emphasis on our classifier for flow-based attacks, which demonstrates the effectiveness of reputation for distributing classifying agents effectively.